Tag: security
I have HUGE news to share from the IBM Cloud team! The IBM Dynamic Cloud Security portfolio has been announced!
IBM Dynamic Cloud Security is the industry’s first software and services portfolio designed specifically for securing enterprises across SaaS, PaaS, and IaaS. This announcement represents the very best of IBM Cloud and IBM Security!
So why is security important to a Cloud strategy? First, we know that Cloud is the infrastructure of choice for data analysis and management. Second, companies need a Cloud solution to remain competitive in the marketplace. With all that data in the Cloud, it has got to be secure!
So what differentiates IBM Cloud Security? The obvious answer is IBM SoftLayer and Bluemix! Both provide a security-rich environment, whether you are talking about single-sign on, security access, identity managing, or data monitoring.
Here’s further proof that IBM is uniquely positioned to offer security for Cloud!
To learn more about IBM Dynamic Cloud Security, visit the IBM Cloud Security web site. There you will find more information about the product, services and resource, such as a training video and registration to a forum discussion.
Helpful link:
IBM Dynamic Cloud Security -> http://www.ibm.com/security/cloud/
The journey into the heart of innovation continues here at SXSW! Let me share with you what has been trending here in Austin.
I’d love to hear your feedback!
We’re taking the App Throwdown to IBM Pulse 2014!
Calling all IBM Business Partners! Come and join us for IBM Pulse (Our Premier CLOUD event!) where we’ll be holding an App Throwdown! Compete with your best solution and be highlighted in front of Clients and IBM Sales teams during qualifying rounds. The winner will be on main stage on Day 3 in front of over 8,000 Re-sellers, Clients, and IBM Sellers – giving you the opportunity to reach a new and broad audience!
In addition to sharing your solution with the conference audience, we will be leveraging Mutual Minds to magnify the reach of your company and your solution. For example, during the main stage session of the AppThrowdown at our recent IBM Connect event, social impressions totalled over 21.7M! (read more about it here) and the winner already has more leads than they can handle!
The Details:
Is my solution eligible? Your need to demonstrate your solution’s use of our Cloud Solution show how your solution runs on SoftLayer or IBM BlueMix. OR integration with IBM Security or Smarter Infrastructure products.
What do I need to do to apply? Submit a 2-5 minute video demonstration of an application that you have built integrating with the solutions above.
How do I register? Click here to fill out this brief form. We’re waiting for your submissions!
Please join me there live!!
Bridging the Cyber Security Skills Gap
We all know about the war for talent and one big gap is in security. Today we(IBM) are announcing that we are adding 11 academic collaborations to its more than 200 partnerships with universities across the globe, focusing on cyber security.
I was looking at some stats from the U.S. Bureau of Labor Statistics, and this field of cyber security is expected to grow by 22%. Especially with the Cloud , and data in mobile environment, this experience will become one of the most crucial!. A UK government report said that it may take 20 years to address the current cyber security skills gaps.
The IBM Academic Initiative (yes, part of my new role!)
As part of IBM’s Academic Initiative, we are launching new curriculum and programs focusing on cyber security with Ballarat University in Australia, Fordham University, Georgia Institute of Technology, San Jose State University, Technische Universität Darmstadt in Germany, Temasek Polytechnic in Singapore, Universidad Cenfotec in Costa Rica, Universiti Kebangsaan in Malaysia, The University of South Carolina, University of Texas at Dallas, and Wroclaw University of Economics in Poland.
IBM’s Cyber Security Innovation Program:
With all the gaps in skills, we have worked to design and facilitate collaboration with educators around the globe to teach students cyber security skills needed to be competitive in a rapidly changing work environment. As part of the Cyber Security Innovation Program, we will provide:
- Technology & Tools: Including access to IBM software portfolio through the IBM Academic Initiative and donated network scanners for use in research labs to monitor intrusions.
- Course Materials: Including a Skills Taxonomy with links to appropriate online pages on Academic Initiative, examples of university programs, security and IT services curriculum, publications and trend reports, as well as case studies and real world challenges
- Faculty Awards: Given to faculty with winning proposals about how to incorporate IBM technology into its curriculum and share what they build with other universities worldwide
Happy Monday and the week of Halloween!
Today, we are going to talk about cyber-attacks and the best practices to try to avoid them. One of the top vulnerabilities is trust through social networking!
Twitter has introduced a new verification feature, after Burger King, Jeep and the Associated Press have all had their Twitter accounts hacked in the last year. Considering Twitter handles are hacked regularly, you should take a few minutes to set up the new verification system:
First off, you’ll have to:
Once that’s out of the way:
1. Go to your
-
account settings
on twitter.com and check the “Require a verification code when I sign in” box.
2. When prompted, click Okay, send me a message.
3. If you receive our verification message, click Yes (Note: you’ll have to enter your password). Once this is set up, when you log in to your account on twitter.com, a six digit code will be sent via SMS to your phone. You’ll have to enter the code when prompted and then you can sign in. Obviously, if you’ve saved your password and don’t log out often, you won’t have to do this. But if you do log out often (or get kicked out because of a browser update), you’ll have to move forward with entering the randomly generated 6-digit code to log-in each time.
For more on this AND to learn about logging into Twitter on other devices and apps (which has an additional few steps).
.